Log in

Security Capacity by Nonlinear Transmission in MIMO Systems for Physical Layer Security

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

To enhance the information security in multiple input multiple output (MIMO) wireless communication systems, nonlinear transmission is studied in this paper by pushing the power amplifier (PA) at the transmitter to operate in the nonlinear region, even near to the saturate point. Linearization reception technique is then adopted at the legal user’s receiver to remove the distortion caused by the nonlinear PA, so that the distortion-free signal can be drawn, and correct demodulation and decoding could be achieved. While for the eavesdroppers, the information required to complete the nonlinear reception could hardly be obtained, since the critical training sequence is designed to be invisible to the eavesdrop** users, so the security transmission between the legitimate users can be obtained. Then, the security capacity by nonlinear transmission is analyzed in the MIMO–OFDM systems, where the signal to distortion plus noise ratio is derived, and the upper approximation is also presented. Numerical simulations are carried out to verify the effectiveness of the proposed scheme with practical reception algorithm, and it is shown that obvious security capacity can be acquired with both memory and memoryless PAs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data Availability

Data generated and/or analyzed during the current study are available from the corresponding author on reasonable request.

Code Availability

Data generated and/or analyzed during the current study are available from the corresponding author on reasonable request.

References

  1. Xu, D., & Zhu, H. (2023). Proactive eavesdrop** of physical layer security aided suspicious communications in fading channels. IEEE Transactions on Information Forensics and Security, 18, 1111–1126.

    Article  Google Scholar 

  2. Halak, B., Yilmaz, Y., & Shiu, D. (2022). Comparative analysis of energy costs of asymmetric verses symmetric encryption-based security applications. IEEE Access, 10, 76707–76719.

    Article  Google Scholar 

  3. Anant, A., & Prasad, R. (2022). Public private data partnerships enabling privacy technologies. In 25th International Symposium on Wireless Personal Multimedia Communications (WPMC) (pp. 86–91) Herning, Denmark.

  4. Yerrapragada, A. K., Eisman, T., & Kelley, B. (2021). Physical layer security for beyond 5G: Ultra secure low latency communications. IEEE Open Journal of the Communications Society, 2, 2232–2242.

    Article  Google Scholar 

  5. Jiang, X., Li, P., Zou, Y., Li, B., & Wang, R. (2022). Physical layer security for cognitive multiuser networks with hardware impairments and channel estimation errors. IEEE Transactions Communications, 70(9), 6164–6180.

    Article  Google Scholar 

  6. Shannon, C. E. (1949). Communication theory of secrecy systems. The Bell System Technical Journal, 28(4), 656–715.

    Article  MathSciNet  Google Scholar 

  7. Wyner, A. D. (1975). The wire-tap channel. Bell System Techical Journal, 54(8), 1355–1387.

    Article  MathSciNet  Google Scholar 

  8. Muratkar, T. S., Bhurane, A., Sharma, P. K., & Kothari, A. (2022). Physical layer security analysis in ambient backscatter communication with node mobility and imperfect channel estimation. IEEE Communications Letter, 26(1), 27–30.

    Article  Google Scholar 

  9. Dai, B., Li, C., Liang, Y., Ma, Z., & Shamai, S. (2022). Self-secure capacity-achieving feedback schemes of Gaussian multiple-access wiretap channels with degraded message sets. IEEE Transactions on Information Forensics and Security, 17, 1583–1596.

    Article  Google Scholar 

  10. Wang, D., Bai, B., Zhao, W., & Han, Z. (2019). A survey of optimization approaches for wireless physical layer security. IEEE Communications Surveys & Tutorials, 21(2), 1878–1911.

    Article  Google Scholar 

  11. Wang, Z., Guo, J., Chen, Z., Yu, L., Wang, Y., & Rao, H. (2022). Robust secure UAV relay-assisted cognitive communications with resource allocation and cooperative jamming. Journal of Communications and Networks, 24(2), 139–153.

    Article  Google Scholar 

  12. Ahn, S., Park, S. I., Kang, J., & Jeong, S. (2021). Pilot and data power allocation in Poisson interference field with protected zone for physical-layer security. IEEE Wireless Communications Letters, 10(2), 271–275.

    Article  Google Scholar 

  13. Jee, J., Kwon, G., & Park, H. (2021). Joint precoding and power allocation for multiuser MIMO system with nonlinear power amplifiers. IEEE Transactions on Vehicular Technology, 70(9), 8883–8897.

    Article  Google Scholar 

  14. Nidhi, Khan, B., Mihovska, A., Prasad, R., & Velez, F.J. (2022). A study on cross-carrier scheduler for carrier aggregation in beyond 5G networks. In 3rd URSI Atlantic and Asia Pacific Radio Science Meeting (AT-AP-RASC) (pp. 1–4). Gran Canaria. Spain.

  15. Zhang, W., Chen, J., Kuo, Y., & Zhou, Y. (2019). Transmit beamforming for layered physical layer security. IEEE Transactions on Vehicular Technology, 68(10), 9747–9760.

    Article  Google Scholar 

  16. Khandaker, M. R. A., Masouros, C., & Wong, K. (2018). Constructive interference based secure precoding: A new dimension in physical layer security. IEEE Transactions on Information Forensics and Security, 13(9), 2256–2268.

    Article  Google Scholar 

  17. Ajayi, I., Medjahdi, Y., Kaddour, F., & Mroueh, L. (2021). Impact of imperfect channel state information on physical layer security by precoding and diversity. In International Conference on Electrical Engineering, Computer Science and Informatics (EECSI). (pp. 322–327).

  18. Tang, J., Jiao, L., Zeng, K., Wen, H., & Qin, K. Y. (2020). Physical layer secure MIMO communications against eavesdroppers with arbitrary number of antennas. IEEE Transactions on Information Forensics and Security, 16, 466–481.

    Article  Google Scholar 

  19. Lee, D. (2021). Secrecy analysis of relay-user selection in AS-AF systems over Nakagami fading channels. IEEE Transactions on Vehicular Technology, 70(3), 2378–2388.

    Article  Google Scholar 

  20. Ouyang, C., Wu, S., Jiang, C., Cheng, J., **ao, A., & Yang, H. (2020). Security enhancement via antenna selection in MIMOME channels with discrete inputs. IEEE Transactions on Communications, 68(8), 5041–5055.

    Article  Google Scholar 

  21. Nguyen, H. C., de Carvalho, E., & Prasad, R. (2014). Multi-user interference cancellation schemes for carrier frequency offset compensation in uplink OFDMA. IEEE Transactions on Wireless Communications, 13(3), 1164–1171.

    Article  Google Scholar 

  22. Gregorio, F., Werner, S., Laakso, T. I., & Cousseau, J. (2007). Receiver cancellation technique for nonlinear power amplifier distortion in SDMA–OFDM systems. IEEE Transactions on Vehicular Technology, 56(5), 2499–2516.

    Article  Google Scholar 

  23. Aggarwal, P., Pradhan, A., & Bohara, V. A. (2021). A downlink multiuser MIMO–OFDM system with nonideal oscillators and amplifiers: Characterization and performance analysis. IEEE Systems Journal, 15(1), 715–726.

    Article  Google Scholar 

  24. Hua, L., Wang, Y., Lian, Z., Su, Y., & **e, Z. (2022). Low-complexity PAPR-aware precoding for massive MIMO–OFDM downlink systems. IEEE Wireless Communications Letters, 11(7), 1339–1343.

    Article  Google Scholar 

  25. Zhang, S. Y., & Shahrrava, B. (2020). A hybrid PAPR reduction scheme for OFDM systems using perfect sequences. IEEE Transactions on Broadcasting, 66(1), 177–186.

    Article  Google Scholar 

  26. Moghaddam, M. H., Aghdam, S. R., Mazzali, N., & Eriksson, T. (2022). Statistical modeling and analysis of power amplifier nonlinearities in communication systems. IEEE Transactions on Communications, 70(2), 822–835.

    Article  Google Scholar 

  27. Li, B., Zou, Y., Zhu, J., & Cao, W. (2021). Impact of hardware impairment and co-channel interference on security-reliability trade-off for wireless sensor networks. IEEE Transactions on Wireless Communications, 20(11), 7011–7025.

    Article  Google Scholar 

  28. Mashdour, S., Moradikia, M., & Yeoh, P. L. (2020). Secure mm-wave communications with imperfect hardware and uncertain eavesdropper location. Transactions on Emerging Telecommunications Technologies, 31(10), e4016.

    Article  Google Scholar 

  29. Sheikholeslami, A., Goeckel, D., & Pishro-Nik, H. (2013). Everlasting secrecy by exploiting non-idealities of the eavesdropper’s receiver. IEEE Journal on Selected Areas in Communications, 31(9), 1828–1839.

    Article  Google Scholar 

  30. Güvenkaya, E., Hamamreh, J. M., & Arslan, H. (2017). On physical-layer concepts and metrics in secure signal transmission. Physical Communication, 25, 14–25.

    Article  Google Scholar 

  31. Zhu, J., Ng, D. W. K., Wang, N., Schober, R., & Bhargava, V. K. (2017). Analysis and design of secure massive MIMO systems in the presence of hardware impairments. IEEE Transactions on Wireless Communications, 16(3), 2001–2016.

    Article  Google Scholar 

  32. Liu, Y., Zhang, L., **a, X., Quan, X., Shao, S., & Tang, Y. (2020). Digital predistortion for MIMO transmitters using multi-channel error feedback adaptation. IEEE Access, 8, 209345–209355.

    Article  Google Scholar 

  33. Ren, J. (2020). Digital predistortion architecture with feedback channel nonlinear blind identification and compensation. IEEE Microwave and Wireless Components Letters, 30(11), 1112–1115.

    Article  Google Scholar 

  34. Wang, S., Cao, W., Hou, R., & Eriksson, T. (2022). A digital predistortion for concurrent dual-band power amplifier linearization based on periodically nonuniform sampling theory. IEEE Transactions on Microwave Theory and Techniques, 70(1), 466–475.

    Article  Google Scholar 

  35. Salman, M. B., & Guvensen, G. M. (2021). An efficient QAM detector via nonlinear post-distortion based on FDE bank under PA impairments. IEEE Transactions on Communications, 69(10), 7108–7120.

    Article  Google Scholar 

  36. Aggarwal, P., & Bohara, V. A. (2019). End-to-end theoretical evaluation of a nonlinear MIMO–OFDM system in the presence of digital predistorter. IEEE Systems Journal, 13(3), 2309–2319.

    Article  Google Scholar 

  37. Xu, J., Jiang, W., Ma, L., Li, M., Yu, Z., & Geng, Z. (2019). Augmented time-delay twin support vector regression-based behavioral modeling for digital predistortion of RF power amplifier. IEEE Access, 7, 59832–59843.

    Article  Google Scholar 

  38. Chen, D., Zhao, Y., Zhou, Y., Ji, Q., Chen, Z., & Tian, F. Modified generalized memory polynomial model of RF power amplifiers. In IEEE 4th International Conference on Electronic Information and Communication Technology (ICEICT). (pp. 317–319).

  39. Li, Y., Wang, X., & Zhu, A. (2022). Reducing power consumption of digital predistortion for RF power amplifiers using real-time model switching. IEEE Transactions on Microwave Theory and Techniques, 70(3), 1500–1508.

    Article  Google Scholar 

  40. Papoulis, A. (1991). Probability, Random Variables and Stochastic Processes, 3nded (p. 307). McGraw-Hill.

    Google Scholar 

  41. Khina, A., Kochman, Y., & Khisti, A. (2018). The MIMO wiretap channel decomposed. IEEE Transactions on Information Theory, 64(2), 1046–1063.

    Article  MathSciNet  Google Scholar 

  42. Rawat D.B. (2016) Analyzing energy efficient physical layer security in large-scale MIMO enabled CRN with QoS requirements. In IEEE Conference on Communications and Network Security (CNS). (pp. 465–471).

  43. Jiang, W., Chen, B., Zhao, J., **ong, Z., & Ding, Z. (2021). Joint active and passive beamforming design for the IRS-assisted MIMOME–OFDM secure communications. IEEE Transactions on Vehicular Technology, 70(10), 10369–10381.

    Article  Google Scholar 

  44. Golub, G., & Loan, C. F. V. (2013). Matrix Computations (4th ed.). Baltimore: The Johns Hopkins University Press.

    Book  Google Scholar 

  45. Alina, Z., & Amrani, O. (2016). On digital post-distortion techniques. IEEE Transactions on Signal Processing, 64(3), 603–614.

    Article  MathSciNet  Google Scholar 

  46. He, H., Lyu, S., & Feng, B. (2023). Secure transmission over multiple access wiretap channel by cross-time interference injection. IEEE Transactions on Communications, 71(1), 370–380.

    Article  Google Scholar 

  47. Dong, Y., Xu, Y., Zhang, T., & **a, Y. (2024). Optimality of the proper gaussian signal in complex MIMO wiretap channels. IEEE Transactions on Information Forensics and Security, 19, 1401–1414.

    Article  Google Scholar 

  48. Sanandaji, N., & Falahati, A. (2020). A hidden OSTBC scheme to enhance physical layer security by employing a pseudorandom precoder. IEEE Transactions on Communications, 68(1), 363–375.

    Article  Google Scholar 

  49. Hua, Y., & Maksud, A. (2023). Continuous encryption functions for security over networks. Signal Processing, 203, 108807. https://doi.org/10.1016/j.sigpro.2022.108807

    Article  Google Scholar 

Download references

Acknowledgements

The work was supported in part by the Natural Science Foundation of Shannxi Province under Grant 2019JM-532, and in part by the Major Scientific and Technological Innovation Project of Shandong Province of China (2020CXGC010705, 2021ZLGX05, 2022ZLGX04).

Funding

Natural Science Foundation of Shannxi Province, 2019JM-532, jieling wang,Major Scientific and Technological Innovation Project of Shandong Province, 2020CXGC010705, jieling wang, 2021ZLGX05, jieling wang, 2022ZLGX04, jieling wang

Author information

Authors and Affiliations

Authors

Contributions

Menghan Li: Conceptualization, Methodology, Software, Data curation, Writing—original draft. Jieling Wang: Validation, Formal analysis, Writing—original draft, review and editing, Supervision, Project administration. Ba-Zhong Shen: Conceptualization, Formal analysis. Yejun Zhou: Methodology, Formal analysis.

Corresponding author

Correspondence to Jieling Wang.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, M., Wang, J., Shen, BZ. et al. Security Capacity by Nonlinear Transmission in MIMO Systems for Physical Layer Security. Wireless Pers Commun (2024). https://doi.org/10.1007/s11277-024-11437-0

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11277-024-11437-0

Keywords

Navigation